Upcoming Webinars

Webinar

With less than a year to go before EU GDPR (General Data Protection Regulation) comes into force your organization needs to be ready to comply with these requirements that demand better controls over how it uses and manages the personal data that it holds. More

Webinar

Consent Lifecycle Management: Consumer IAM’s Core Capability?

Sep 12, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

2018 is going to be a hell of a year for nearly every organization operating within the European Union. Not only the dreaded General Data Protection Regulation (GDPR) will finally take effect next July, introducing massive changes to the way companies will have to deal with personal information (not to mention hefty fines for violations), January 2018 also marks the implementation date of the revised Payment Service Directive (PSD2), which will break the banks’ monopoly on their customers’ account information. More

Webinar

Cognitive Technologies and the Future of Identity & Access Management

Sep 14, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

Like any other field of information technology, identity and access management has been rapidly evolving to meet new business challenges created by the Digital Transformation. As modern businesses are becoming increasingly open and interconnected, IAM solutions now need to cover not just employees, but customers, partners and smart IoT devices. They must be able to handle the growing complexity of managing and monitoring access to the company’s most valuable digital assets, regardless of their format, location or scale, while still maintaining compliance and protecting them from cyber risks. More

Webinar

Database Security: Protecting Your Company’s Core Competence in the Age of Digital Transformation

Sep 19, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

Relational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or confidential customer records - all this most valuable corporate data must be protected against compromises of their integrity and confidentiality without affecting their availability for business processes. The number of security risks databases are open to is also substantial, covering the information itself stored and processed in databases, underlying computing and network infrastructures, as More

Webinar

The New Role of IAM in the Age of Digital Transformation

Sep 20, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

Organizations are under pressure to change in the current age of Digital Transformation. One of the key differentiators of innovative digital business models and thus new revenue streams is the profoundly changed relationship to customers and consumers. Creating innovative consumer services, collecting and managing better customer information and even just optimizing the reach of everyday marketing activities – all this depends on the ability to manage consumer identities in a flexible, scalable and secure way. More

Webinar

Unstructured Data – A Blind Spot for GDPR Compliance

Sep 21, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

While many (but not enough) organizations have finally begun preparing for GDPR compliance, there are still important steps to take. When in May 2018 the upcoming EU GDPR (General Data Protection Regulation) comes into force, the requirements for managing personal data will change. More

Webinar

The Crucial Role of Identity in Securing Industrial IoT

Sep 26, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

As more and more consumers, businesses, public sector companies and even whole countries are embracing the Digital Transformation, smart devices of all types are proliferating in all areas of our daily lives. It is safe to say, however, that, after the initial rush of making every device in the world smart and connected, the Internet of Things has already passed the peak of inflated expectations, with both vendors and users of the technology finally starting to care more about such things as interoperability and security. More

Webinar

Dynamic Externalized Authorization for the Evolution of the Service-Oriented Architecture - Using ABAC for APIs and Microservices

Sep 28, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

In the Digital Transformation era, businesses must be more agile than ever to adapt to constantly changing technology and regulatory landscapes and to meet the newest customer-centric initiatives. Constantly bombarded with new business requirements, software development and DevOps teams are increasingly looking into new approaches to make their applications more flexible, scalable and easier to maintain and modernize. In recent years, service-oriented architectures and microservices in particular have become the preferred method for many developers to create modular and adaptable enterprise More

Webinar

Top Considerations for Selecting an Identity and Access Management as a Service Vendor

Oct 05, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

As organizations continue to move their data and application functions into the cloud for obvious business reasons like improved flexibility and scalability, reduced time to market and cost savings, protecting their sensitive data across both on-premises and the cloud is becoming increasingly complicated. To ensure consistent and secure access management to for these data and applications across a heterogeneous IT landscape from any device and location is a massive challenge, further complicated by new compliance regulations such as GDPR, which makes the cost of a mistake extremely high. More

Webinar

Knowing Your Customer Well: The Importance of Assurance and Identity Governance for CIAM

Oct 17, 2017 4:00pm CEST, 10:00am ET, 7:00am PT

Consumer Identity and Access Management is a fast-growing market. Emerging just a few years ago, it has quickly evolved to become an indispensable tool for many organizations to improve the reach and targeting of their marketing activities, increase the number of new customer registrations and to provide frictionless user experience. CIAM solutions allow businesses and public-sector agencies to gather more information about the consumers while maintaining compliance with the current and upcoming data protection regulations like the EU GDPR and PSD2. More

Next Conference

Sep122017

Conference

Consumer Identity World Tour 2017

Sep 12 - Dec 14, 2017 in Seattle - Paris - Singapore

The Consumer Identity World Tour is the place where you can dive deeper into the world of CIAM. Learn more about privacy by design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.